There are clear benefits to managing IAM centrally for all applications, be they web portal, cloud-based services, VPNs or virtual environments. According to a recent Gemalto survey, organizations on average protect 3 to 4 applications of each type with two-factor authentication (2FA). Given the numerous management complexities that arise from a fragmented IT environment, it comes as no surprise then that 94% of IT decision makers would like to be able to manage two-factor authentication centrally for all the applications in their organization.By ensuring your Identity and Access Management solutions’ integration ecosystem is as broad as possible, you are paving the path for a smooth, quick and cost-effective implementation of whatever IAM functionality you’re looking to gain, be it PKI credential management, cloud identity management or cloud SSO. A pre-integrated and validated solution spares your IT department the need for additional development and subsequent performance issues.

Use cases supported by IAM solutions

When checking the breadth of a prospective IAM solution’s integration ecosystem, it helps to evaluate it against specific use cases and resources you are looking to support, as exemplified below.

• Digital signature – Based on PKI credentials, these enable proving that a document, transaction or email were signed.
• Email encryption – Protects email from being read by entities other than the intended recipient.
• FDE – Full-disk encryption (FDE) encrypts data on a hard drive so that it cannot be understood by anyone who doesn’t have the key to decrypt the data.

Solutions that support industry-wide standards enable you to meet current, upcoming and evolving business needs.
Some examples of these standards include:

• OATH – An open reference architecture for implementing strong authentication, produced by an industry-wide collaboration of security vendors for the universal adoption of strong authentication. The standards includes widely used algorithms for generating one-time passcodes.
• APIs – These enable integrating with custom applications (legacy apps that do not support SAML, RADIUS, etc.).
• SAML – An open source protocol, produced by the OASIS standards consortium, for integrating cloud apps using a central, trusted identity provider
• RADIUS – Commonly used by VPNs and security gateways, RADIUS (Remote Authentication Dial-In User Service) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate users and authorize their access.

From Twitter

Subscribe to updates

Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website.

Latest comments

21/02/18 @ 10:02MikeFingerprint on my mobil and hope to se Iris in the mobil soon. And hope to see fingerprint i paymentcards!

19/02/18 @ 16:02Tiffany ConwayHi David,
Thanks so much for your enthusiasm and interest in DDL! Unfortunately, at this time the pilot is still limited to a group of selected CO DMV participants, and enrollment at DMV locations is not yet being offered. We are working hard alongside our partners to ensure that DDL will be an option for any resident in the near future.
In the meantime, please do stay engaged in our pilot activity and news. And feel free to drop us a line at ddlpilot@gemalto.com – We would be happy to add your name to a wait-list of people who are interested in being part of a later phase of test participants.
Thanks again,
Tiffany

19/02/18 @ 16:02Tiffany ConwayHi Robert,
Yes, you hit the nail on the head! That is exactly the concept - a securely stored and locked application that houses an encrypted file which represents your driver's license or ID card in a digital format. This is very similar to mobile payment on your smart phone. The data that is presented is a digital representation of a physical credit card, but provides new benefits like greater convenience and higher security.
Thanks,
Tiffany